};
+static const char * eap_tls_state_txt(int state)
+{
+ switch (state) {
+ case START:
+ return "START";
+ case CONTINUE:
+ return "CONTINUE";
+ case SUCCESS:
+ return "SUCCESS";
+ case FAILURE:
+ return "FAILURE";
+ default:
+ return "Unknown?!";
+ }
+}
+
+
+static void eap_tls_state(struct eap_tls_data *data, int state)
+{
+ wpa_printf(MSG_DEBUG, "EAP-TLS: %s -> %s",
+ eap_tls_state_txt(data->state),
+ eap_tls_state_txt(state));
+ data->state = state;
+}
+
+
static void * eap_tls_init(struct eap_sm *sm)
{
struct eap_tls_data *data;
if (req == NULL) {
wpa_printf(MSG_ERROR, "EAP-TLS: Failed to allocate memory for "
"request");
- data->state = FAILURE;
+ eap_tls_state(data, FAILURE);
return NULL;
}
wpabuf_put_u8(req, EAP_TLS_FLAGS_START);
- data->state = CONTINUE;
+ eap_tls_state(data, CONTINUE);
return req;
}
case CONTINUE:
if (tls_connection_established(sm->ssl_ctx, data->ssl.conn)) {
wpa_printf(MSG_DEBUG, "EAP-TLS: Done");
- data->state = SUCCESS;
+ eap_tls_state(data, SUCCESS);
}
break;
default:
{
struct eap_tls_data *data = priv;
if (eap_server_tls_phase1(sm, &data->ssl) < 0)
- data->state = FAILURE;
+ eap_tls_state(data, FAILURE);
}
if (eap_server_tls_process(sm, &data->ssl, respData, data,
EAP_TYPE_TLS, NULL, eap_tls_process_msg) <
0)
- data->state = FAILURE;
+ eap_tls_state(data, FAILURE);
}